中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
Communities
Subjects
All Items
作者
Content Type
会议论文 [142]
Issued Date
Language
英语 [14]
中文 [1]
Source
lecture n... [60]
proceeding... [3]
2011 ieee ... [2]
applicable... [2]
mobisys'11... [2]
更多...
Project
Indexed
EI [62]
SCI [8]
其他 [4]
CPCI(ISTP) [2]
ISTP,EI,AC... [1]
更多...
Spnsorship
korea inte... [4]
state key ... [4]
the nation... [4]
acm sigmob... [2]
china comp... [2]
更多...
ISCAS OpenIR
>
信息安全国家重点实验室
>
会议论文
view all items
(Results 1-20 of 142)
Help
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
[会议论文]
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
  |  
View/Download:33/2
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
[会议论文]
International Conference on Information and Communications Security, Friendship Hotel, Haidian District, Beijing, China, 2011/11/23-2011/11/26
Jun Jiang
;
Xiaoqi Jia
;
Dengguo Feng
;
Shengzhi Zhang
;
Peng Liu
  |  
View/Download:46/1
an efficient pba protocol based on elliptic curves
[会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Chu Xiaobo
;
Qin Yu
;
Feng Dengguo
  |  
View/Download:43/0
an efficient group-based secret sharing scheme
[会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Lv Chunli
;
Jia Xiaoqi
;
Lin Jingqiang
;
Jing Jiwu
;
Tian Lijun
  |  
View/Download:42/1
demo: a sensor network time synchronization protocol based on fm radio data system
[会议论文]
9th International Conference on Mobile Systems, Applications, and Services, MobiSys'11 and Co-located Workshops, Bethesda, MD, United states, 28-Jun-02
Li Liqun
;
Xing Guoliang
;
Sun Limin
;
Huangfu Wei
;
Zhou Ruogu
;
Zhu Hongsong
  |  
View/Download:37/0
an instruction-level software simulation approach to resistance evaluation of cryptographic implementations against power analysis attacks
[会议论文]
2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, Shanghai, China, 10-Jun-02
Li Jiantang
;
Zhou Yongbin
;
Liu Jiye
;
Zhang Hailong
  |  
View/Download:29/0
bcbc: a more efficient mac algorithm
[会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liang Bo
;
Wu Wenling
;
Zhang Liting
  |  
View/Download:23/0
efficient secret sharing schemes
[会议论文]
8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application, STA 2011, Loutraki, Greece, 28-Jun-02
Lv Chunli
;
Jia Xiaoqi
;
Lin Jingqiang
;
Jing Jiwu
;
Tian Lijun
;
Sun Mingli
  |  
View/Download:44/2
collusion attack on a self-healing key distribution with revocation in wireless sensor networks
[会议论文]
11th International Workshop on Information Security Applications, WISA 2010, Jeju Island, Korea, Republic of, August 24,
Bao Kehua
;
Zhang Zhenfeng
  |  
View/Download:75/0
color image segmentation using automatic pixel classification with support vector machine
[会议论文]
Wang Xiang-Yang
;
Wang Qin-Yan
;
Yang Hong-Ying
;
Bu Juan
  |  
View/Download:32/1
attacking bivium and trivium with the characteristic set method
[会议论文]
4th International Conference on the Theory and Application of Cryptographic Techniques, AFRICACRYPT 2011, Dakar, Senegal, 5-Jul-20
Huang Zhenyu
;
Lin Dongdai
  |  
View/Download:23/0
depsim: a dependency-based malware similarity comparison system
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang
;
Lingyun Ying
;
Rui Wang
;
Purui Su
;
Dengguo Feng
  |  
View/Download:32/2
Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256,320}*
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wang Gaoli
  |  
View/Download:28/1
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
[会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng
;
Zhang Zhenfeng
;
Feng Dengguo
  |  
View/Download:65/0
acquiring key privacy from data privacy
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Zhang Rui
  |  
View/Download:49/1
exploiting fm radio data system for adaptive clock calibration in sensor networks
[会议论文]
9th International Conference on Mobile Systems, Applications, and Services, MobiSys'11 and Co-located Workshops, Bethesda, MD, United states, 28-Jun-02
Li Liqun
;
Xing Guoliang
;
Sun Limin
;
Huangfu Wei
;
Zhou Ruogu
;
Zhu Hongsong
  |  
View/Download:320/0
fault propagation pattern based relevant faulty ciphertexts filtering towards dfa on aes
[会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Wang Na
;
Zhou Yongbin
  |  
View/Download:34/0
gateway-oriented password-authenticated key exchange protocol with stronger security
[会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Wei Fushan
;
Ma Chuangui
;
Zhang Zhenfeng
  |  
View/Download:46/0
general construction of chameleon all-but-one trapdoor functions
[会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Liu Shengli
;
Lai Junzuo
;
Deng Robert H.
  |  
View/Download:52/1
a short signature scheme from the rsa family
[会议论文]
13th Information Security Conference, ISC 2010, Boca Raton, FL, United states, 25-Oct
Yu Ping
;
Xue Rui
  |  
View/Download:33/0
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace